Exam Flashcards
(47 cards)
The common resources that can be targeted in DoS attacks are ___ and ___ ?
The common resources that can be targeted in DoS attacks are network bandwidth (for network) and system resources (like memory and CPU).
Lamport’s one-time password scheme relies on using hash functions that are ___ and ___ .
Lamport’s one-time password scheme relies on using hash functions that are one way and collision resistant.
Examples of each of the main authentication bases are … ? (Three examples)
- Something you know (password, PIN, security questions)
- Something you have (Security Tokens, smart cards, etc.)
- Something you are (Fingerprint, Facial Recognition)
“Online” and “Offline” attacks differ in that ___.
- Online requires the connection to be active, therefore imposing certain restriction for breaking a password.
- Offline does not require the connection to be active, therefore has unlimited chances to break the password.
A minimum time between password changes is specified so users ___.
So that users do not change their password too often in a short period - which could lead to weaker password choices.
Two security properties of cryptographic hash functions are ___ and ___.
- Collision Resistance - Hard to find two different inputs that produce the same hash.
- Preimage Resistance - Difficult to figure out the original input from its hash.
A mechanism capable of distinguishing between humans and computers may be a ___.
CAPTCHA
3 classes of intruders that an IDS may attempt to find are…?
- Clandestine Users - Individuals who gain unauthorised access to privileged system resources or data.
- Masqueraders - Users who access the system by impersonating another legitimate user, often through stolen credentials.
- Misfeasor - A legitimate user who has authorised access but uses them in an improper or unauthorised manner.
Two primary properties used in malware classification are ___ and ___.
- Functionality - What the malware does such as stealing data, encrypting files for ransom or causing system damage.
- Propagation Method - How the malware spreads, like through email attachments, infected websites, or network vulnerabilities.
Race conditions can occur when ___ and can result in ___.
Race conditions occurs when two or more processes try to change or access the same data at the same time and can result in unpredictable or incorrect behaviour in a system.
It’s like two people trying to edit the same document simultaneously without coordinating. If they don’t take turns properly, they might overwrite each other’s changes or create confusion.
Phishing emails are typically sent in bulk because ___.
Phishing emails are typically sent in bulk because attackers want to increase the chance of victims falling for the scam.
The Biba model is for the purpose of ___ while BLP is for the purpose of ___.
The Biba model is for the purpose of ensuring data integrity, while BLP (Bell-LaPadula) is for the purpose of maintaining data confidentiality.
The Biba model focuses on preventing unauthorized users from modifying sensitive data, thereby ensuring that the information remains accurate and uncorrupted.
The Bell-LaPadula model, on the other hand, is primarily concerned with keeping sensitive information secret and preventing unauthorized access to it.
SYN flooding is an example of ___.
Denial of Service attack (Dos).
To be stateless means ___ and is relevant in the context of ___.
To be stateless means each request from a client to a server is treated as completely new, with no memory of past interactions.
It is relevant in the context of client puzzle connection protocol.
What’s the difference between spear phishing and general phishing?
Spear Phishing is targeting a specific person.
General Phishing is targeting all victims and expecting some to be fooled.
Three types of malware are?
- Viruses
- Trojan Horses.
- Worms
The term “shellcode” refers to ___ and is relevant in the context of ___.
“Shellcode” refers to code that hackers use to control a compromised computer system.
It’s important in the context of computer security breaches and attacks.
The difference between logging and auditing is ___.
Logging - involves recording detailed information about events and actions in a system.
Auditing - the process of reviewing and analysing these log files to check for anything unusual or important.
A firewall cannot typically protect against ___ or ___.
- Internal Threats: These are threats originating from within an organization, such as a malicious employee. Since firewalls are designed to monitor and control incoming and outgoing network traffic, they are less effective against threats that originate inside the network.
- Social Engineering Attacks: These are techniques that trick people into revealing sensitive information or performing certain actions. Since these attacks exploit human vulnerabilities rather than technical ones, firewalls, which focus on network traffic, cannot prevent them.
The purpose of sanitisation in the context of auditing is to ___.
The purpose of sanitization in the context of auditing is to hide or delete sensitive information from data to protect privacy while still allowing the data to be reviewed or analyzed.
Part B
Describe two distinct types of attack against password systems and the countermeasures against each of those attacks.
Brute Force Attack - The attacker trying every possible password combination until the correct password is found.
Countermeasure - Implement rate limiting where user gets locked out after certain amount of failed attempts.
Phishing Attack - The attacker tricks a user into revealing their password.
Countermeasure - Educating the dangers of phishing and how to recognise it. In addition, use 2FA for extra layer of security.
Part B
Describe two general “good practices in coding”. For each of them explain why they are appropriate and give an example off what could go wrong if that practice is not followed.
- Never store secrets in code :
Importance - Keeping passwords or keys in code is risky because if somebody gets the code, they get the secrets too.
Risk of not following - If a sensitive API is stored in the code, and leaked, the attacker can use this API to interact with the 3rd party services leading to incurred cost or accessing restricted data.
- Set default to deny instead of default to allow :
Importance - This means only giving access when necessary and not letting anyone has access unless they’re specifically granted.
Risk of not following - If default is set to allow, someone could easily access things they shouldn’t.
Part B
Explain what tailored attacks are. Give some specific examples in two different domains and explain how they perform relative to the others attacks in those domains.
- Corporate Espionage.
Example - An attacker might gather detailed information about a company’s IT infrastructure and employee habits. The attacker then spear phishes specific employees with high levels access, using information they gathered to form believable scams for the target to fall into.
Performance relative to other attacks - Tailored attacks in corporate settings are typically more successful than generic attacks because they use specific gathered information to bypass security measures and exploit human vulnerabilities effectively.
- Government or Political Targeting.
Example - A state-sponsored group might conduct a tailored attack against another government’s infrastructure, like targeting a specific power grid or election system. They would use knowledge about the system’s architecture and possibly even insider information to create a precise, damaging attack.
Performance Relative to Other Attacks - In the realm of government or political systems, tailored attacks can be more dangerous than widespread attacks because they are designed to undermine specific, critical functions or to gather highly sensitive information, often going undetected for longer periods due to their sophisticated and targeted nature.
Part C
Explain how Unix protects user passwords
Unix protects password using a layered approach.
- Passwords are hashed.
- Salting is then added to ensure each password hash is unique.
- The password file is then stored securely so that it’s not easily accessible to unauthorised users.
- File permissions restricts access to the password file to root or privileged processes.